MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 aab6a168d8cf325e145966da9b8e1e4112fae03471df81d4e0e9b0272a2a4832. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



StrelaStealer


Vendor detections: 13


Intelligence 13 IOCs YARA 4 File information Comments

SHA256 hash: aab6a168d8cf325e145966da9b8e1e4112fae03471df81d4e0e9b0272a2a4832
SHA3-384 hash: e6db1bbad4aac6082554caeb0af3127e8e37d4acf64fac2805a94c3616b1c4194b9dc85493427b19a1680338cb179d03
SHA1 hash: dbfe4b27d22e57ee14770f014640d17cb9e6e37e
MD5 hash: fe333f01e64325365dbdd662bee69e2e
humanhash: pennsylvania-robin-sink-two
File name:nigger.exe
Download: download sample
Signature StrelaStealer
File size:369'152 bytes
First seen:2025-03-13 10:41:37 UTC
Last seen:2025-03-13 13:36:18 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'658 x AgentTesla, 19'469 x Formbook, 12'208 x SnakeKeylogger)
ssdeep 6144:R5NiQXdlkOjBfep9VzRVGii+GBD2XSJzEKikH18f/WUYe2a+hY6:D8QzkMmH6+CfIkV8mUS
TLSH T168742301B50DE679E7F423FCB74BA7AD897B8952DD158B5E38C0126F1A9E6070FA4320
TrID 71.1% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
10.2% (.EXE) Win64 Executable (generic) (10522/11/4)
6.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.3% (.EXE) Win32 Executable (generic) (4504/4/1)
2.0% (.ICL) Windows Icons Library (generic) (2059/9)
Magika pebin
Reporter JAMESWT_WT
Tags:176-65-144-116 exe StrelaStealer

Intelligence


File Origin
# of uploads :
2
# of downloads :
407
Origin country :
IT IT
Vendor Threat Intelligence
Verdict:
Malicious
Score:
96.5%
Tags:
xtreme msil sage
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Сreating synchronization primitives
Connection attempt
Sending a custom TCP request
Using the Windows Management Instrumentation requests
Creating a window
Reading critical registry keys
Launching a process
Creating a file in the %AppData% directory
Creating a file
Stealing user critical data
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
obfuscated packed packed packer_detected
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Strela Stealer
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
.NET source code contains very large array initializations
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Creates a thread in another existing process (thread injection)
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
Joe Sandbox ML detected suspicious sample
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Set autostart key via New-ItemProperty Cmdlet
Suspicious powershell command line found
Switches to a custom stack to bypass stack traces
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal Bitcoin Wallet information
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Yara detected Costura Assembly Loader
Yara detected Generic Stealer
Yara detected Strela Stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1637172 Sample: nigger.exe Startdate: 13/03/2025 Architecture: WINDOWS Score: 100 51 216.47.6.0.in-addr.arpa 2->51 69 Antivirus / Scanner detection for submitted sample 2->69 71 Multi AV Scanner detection for submitted file 2->71 73 Yara detected Generic Stealer 2->73 75 6 other signatures 2->75 8 nigger.exe 6 2->8         started        13 nigger.exe 3 2->13         started        15 nigger.exe 2->15         started        signatures3 process4 dnsIp5 67 193.26.115.87, 49681, 49710, 49716 QUICKPACKETUS Netherlands 8->67 43 C:\Users\user\AppData\Roaming\nigger.exe, PE32 8->43 dropped 45 C:\Users\user\...\nigger.exe:Zone.Identifier, ASCII 8->45 dropped 47 C:\Users\user\AppData\...\nigger.exe.log, ASCII 8->47 dropped 77 Suspicious powershell command line found 8->77 79 Tries to steal Mail credentials (via file / registry access) 8->79 81 Found many strings related to Crypto-Wallets (likely being stolen) 8->81 95 4 other signatures 8->95 17 chrome.exe 1 8->17         started        20 powershell.exe 1 11 8->20         started        22 chrome.exe 8->22 injected 24 chrome.exe 8->24 injected 83 Antivirus detection for dropped file 13->83 85 Multi AV Scanner detection for dropped file 13->85 87 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 13->87 26 chrome.exe 1 13->26         started        28 chrome.exe 13->28 injected 30 chrome.exe 13->30 injected 89 Tries to harvest and steal browser information (history, passwords, etc) 15->89 91 Tries to harvest and steal Bitcoin Wallet information 15->91 93 Creates a thread in another existing process (thread injection) 15->93 32 chrome.exe 15->32         started        file6 signatures7 process8 dnsIp9 49 192.168.2.10, 138, 443, 49681 unknown unknown 17->49 34 chrome.exe 17->34         started        37 conhost.exe 20->37         started        39 chrome.exe 26->39         started        41 chrome.exe 32->41         started        process10 dnsIp11 53 googlehosted.l.googleusercontent.com 142.250.185.193, 443, 49702, 49703 GOOGLEUS United States 34->53 55 www.google.com 142.250.185.196, 443, 49687, 49688 GOOGLEUS United States 34->55 57 clients2.googleusercontent.com 34->57 59 142.250.185.129, 443, 49731 GOOGLEUS United States 39->59 61 142.250.185.132, 443, 49722, 49726 GOOGLEUS United States 39->61 65 4 other IPs or domains 39->65 63 172.217.18.4, 443, 49749, 49750 GOOGLEUS United States 41->63
Threat name:
Win32.Trojan.Generic
Status:
Suspicious
First seen:
2025-03-13 10:39:32 UTC
File Type:
PE (.Net Exe)
Extracted files:
1
AV detection:
21 of 24 (87.50%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
collection discovery execution persistence spyware stealer
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
outlook_office_path
outlook_win_path
Browser Information Discovery
System Location Discovery: System Language Discovery
Accesses Microsoft Outlook profiles
Adds Run key to start application
Command and Scripting Interpreter: PowerShell
Reads WinSCP keys stored on the system
Reads user/profile data of web browsers
Unpacked files
SH256 hash:
aab6a168d8cf325e145966da9b8e1e4112fae03471df81d4e0e9b0272a2a4832
MD5 hash:
fe333f01e64325365dbdd662bee69e2e
SHA1 hash:
dbfe4b27d22e57ee14770f014640d17cb9e6e37e
SH256 hash:
ab5faf91447e0deafdd7199d6f701dbf9f66b13b558cfc4d586a06c6f71c727b
MD5 hash:
0ae5a435c4d33b77e876bf8581c9ac75
SHA1 hash:
1c5a10a0ccb81ddcd744760857fc7fba9df29915
SH256 hash:
ae84d2a6ccb0c50fb9acd508b7a95bad2d347ccacb6e90e2f68cc6c6bf7d26d5
MD5 hash:
19f1fa3ea2c446b63da8f6b9ed318d07
SHA1 hash:
2549c0121a3188f28c3a601c1606b6c49949e72c
SH256 hash:
b264a0abbce3dbe99d9694f4438f0c3b89bb39e4a17e1840bcd39433a48d6968
MD5 hash:
0ee7a183ef06282619bda03851ef7aa9
SHA1 hash:
910fd8956ca9dc72cde243eac2a8188dc93a3976
Detections:
SUSP_OBF_NET_Reactor_Indicators_Jan24
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:NET
Author:malware-lu
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:Sus_Obf_Enc_Spoof_Hide_PE
Author:XiAnzheng
Description:Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP)

File information


The table below shows additional information about this malware sample such as delivery method and external references.

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (HIGH_ENTROPY_VA)high

Comments